Overview
Explore post-quantum digital signatures and optical quantum random number generators (OQRNG) in this DefCamp 2019 conference talk. Delve into cryptography fundamentals, including one-time pads, public key encryption, and digital signatures. Examine the implications of quantum supremacy and the need for post-quantum cryptography. Learn about hash-based digital signatures, their generation, and verification processes. Discover quantum random number generators, focusing on Geiger-Muller detectors and time-of-arrival generators. Analyze the security aspects and efficiency of these systems, and gain insights into their Python implementation. Conclude with a Q&A session to address audience inquiries on this cutting-edge topic in information security.
Syllabus
Introduction
Cryptography
Onetime Pad
Leak
ASCII table
Public key encryption
Public key cryptosystem
Digital signatures
Post quantum cryptography
Quantum supremacy
IBM didnt like it
Efficiency
Hashbased digital signatures
Onetime signature
Verify signature
Minimum security
One time signature
Hash values
Signature generation
How it works
Quantum random number generators
Geiger Muller detector
Random number generator
Quantum optics
Time of arrival generators
Key generation
Security
Python implementation
Time intervals
Schema efficiency
Questions
Taught by
DefCamp